

We’re excited to announce that Cloudflare now supports security keys as a two factor authentication (2FA) method for all users. Cloudflare customers now have the ability to use security keys on WebAuthn-supported browsers to log into their user accounts. We strongly suggest users configure multiple security keys and 2FA methods on their account in order to access their apps from various devices and browsers. If you want to get started with security keys, visit your account's 2FA settings.

WebAuthn is a standardized protocol for authentication online using public key cryptography. It is part of the FIDO2 Project and is backwards compatible with FIDO U2F. Depending on your device and browser, you can use hardware security keys (like YubiKeys) or built-in biometric support (like Apple Touch ID) to authenticate to your Cloudflare user account as a second factor. WebAuthn support is rapidly increasing among browsers and devices, and we’re proud to join the growing list of services that offer this feature.
To use WebAuthn, a user registers their security key, or “authenticator”, to a supporting application, or “relying party” (in this case Cloudflare). The authenticator then generates and securely stores a public/private keypair on the device. The keypair Continue reading
Every time I’m complaining about the stupidities $vendors are trying to sell us, someone from vendorland saddles a high horse and starts telling me how I got it all wrong, for example:
It is a duty of a pre-sales, consultant, vendor representative to inform the customer about the risk.
When you stop laughing (and it’s not an April Fools’ joke), here’s how the reality of that process looks like (straight from one of my readers):
I remember when the VM guys and their managers were telling me (like they had discovered the solutions to all of ours problems) about “with VXLAN we can move a machine from one country to another, and keep having service with the same IP” … while looking at me with the “I’m so smart” face… and me thinking shit… I’m doomed :) … I don’t even want to start explaining … but in the long run I had to anyway.
It all started with a blog post by Axonius’ Nathan Burke: Things will be weird in cybersecurity...
Today's show goes deep on cloud-based security, remote access, and zero trust with sponsor Zscaler. In particular we explore Zscaler Private Access, an alternative to traditional IPSec VPNs. We take a packet walk through Zscaler's service to understand how it works. Our guest is Lisa Lorenzin, Director, Transformation Strategy at Zscaler.
The post Heavy Networking 509: Zscaler – Enabling Fast, Secure Remote Work For Employees (Sponsored) appeared first on Packet Pushers.
Palo Alto paid $420million for Cisco competitor CloudGenix; Microsoft fumbled COVID-19 cloud...
The Great Infection is unique among recessions in that it is essentially a self-imposed economic downturn, not the result of over-exuberance or excess optimism or greed, but by a spikey ball of fat that is not alive but is more like a self-replicating biological machine that only knows how to do one thing: Copy itself if it reaches the right sticky environment in time before it dries out and falls apart. …
IT Spending Prognostication During The Great Infection was written by Timothy Prickett Morgan at The Next Platform.
A pool of operators, including AT&T, SK Telecom, Telefónica, Vodafone have partnered on the...
An example of using the fuzzywuzzy Python module to match data sets with similar but not exact data - fuzzy matches! I was recently given a list of locations that I had to analyze. For the analysis, I needed data that was not in the original list (lets call that the source list). Luckily I READ MORE
The post FuzzyWuzzy was a Python Module appeared first on The Gratuitous Arp.
Nathalie Trenaman is the Routing Security Programme Manager at RIPE NCC. Rick & Melchior ask her everything about what RIPE NCC does, why should we care about Routing Security, RPKI and of course we talk about if and how we can get IPv4 address space.
Listen below or subscribe on the homepage!

In this first episode of The Routing Table Podcast Rick & Melchior ask the new Juniper Networks CTO Raj about his career, why he joined Juniper and what his 100 days plan looks like.
Listen below or subscribe on the homepage!


CloudGenix will form the second pillar of Palo Alto's emerging secure access service edge offering,...
The operator tapped Cisco’s SD-WAN to “solve corporate challenges from workstyle reform,...
Roshan Thekkekunnel of HPE shares his thoughts on NFV infrastructure (NFVI), industry...